AuthenticationAuthentication is synonymous with authentication: the process and result of authenticate. This verb, in turn, refers to checking the authenticity or legality of something or the act of proving it as authentic.

How can you tell from these ideasTo understand what authentication is, it is essential to know what the concept of authentic refers to. The authentic is what is certified or documented as safe or true. Said certification and / or documentation procedure, in short, is what is known as authentication.

The notion of authentication is often used in the field of computing when a computer (a computer) searches verify digital identity from a sender trying to establish communication and connect to the computer. The sender can be a user (human), software (computer program) or another computer (machine).

Authentication, on the other hand, may be required by a system when someone tries to access it. Every time a person wants to check their email on a platform webmailFor example, you need to enter your username and password (password). The system then proceeds to authenticate the user: it analyzes the data entered and compares it with the information available in its database. If the data matches (that is, it is correct), authentication is complete and the system allows access. Otherwise, reject the request. Authentication, in this way, is a security mechanism.

To use a ATM (ATM) or perform a e-commerce You also need to go through an authentication process.

Authentication is just one of the three main steps of the processes that seek to guarantee data network security. Although these vary according to the system and the importance of the data that must be protected, we can broadly define the following three:

* authentication: as explained above, it consists of an attempt to verify the identity of a user who wishes to establish a connection with a database;

Authentication* authorization: Once properly identified, the network allows the user to Username access some of its resources;

* audit: all accesses made by the authorized user during their session are recorded.

The North American company Apple has an authentication system that it has called double factor thanks to which the ID of its users have an extra layer of security. Simply put, the goal is to minimize the chances of someone accessing the account someone else’s, even if you know your victim’s password.

Apple’s two-factor authentication allows users to define their devices trusted (such as a Mac, an iPad or an iPhone), so that they can only establish a connection from them. If you want to log in from one that has not been stored in the database, then you must specify two pieces of information: the password and a six-digit code that allows you to verify your identity.

To further explain this authentication system, let’s consider a user who has an iPad and wants to access his account for the first time from a Mac that he has recently acquired. You will first need to enter your password on the new device, after which you will have to copy a code checkbox that will appear automatically on your iPad. It goes without saying that the only way to violate this security measure – not to mention a complex computer attack on Apple’s databases – is to steal both devices, in addition to finding out the password of their owner.